Quantcast
Channel: 看得透又看得远者prevail. ppt.cc/flUmLx ppt.cc/fqtgqx ppt.cc/fZsXUx ppt.cc/fhWnZx ppt.cc/fnrkVx ppt.cc/f2CBVx
Viewing all articles
Browse latest Browse all 20522

利用simple-encrypted-socks5-proxy翻墙

$
0
0
登陆linux vps.
git clone https://github.com/tuoxie007/simple-encrypted-socks5-proxy
cd simple-encrypted-socks5-proxy

root@ar:~/simple-encrypted-socks5-proxy# nano config.py
root@ar:~/simple-encrypted-socks5-proxy# cat config.py
server_bind_addr = ("0.0.0.0", 4040)
local_bind_addr = ("127.0.0.1", 6060)

server_proxy_addr = ("your_remote_proxy_ip", server_bind_addr[1])

def encode(c):
  return chr(c^245)
root@ar:~/simple-encrypted-socks5-proxy#
(上面黄色文字是我修改后的值。只需修改config.py, 不要修改server.py和local.py)
root@ar:~/simple-encrypted-socks5-proxy# python server.py &

不过python server.py &容易退出运行,我们可以利用daemonize来把python server.py运行为daemon:
root@ar:~/simple-encrypted-socks5-proxy# daemonize -c . /usr/bin/python server.py
root@ar:~/simple-encrypted-socks5-proxy#
 服务器端就搭建好了。

在客户机器mac上。
git clone https://github.com/tuoxie007/simple-encrypted-socks5-proxy
cd simple-encrypted-socks5-proxy

yudeMacBook-Air:simple-encrypted-socks5-proxy brite$ nano config.py
yudeMacBook-Air:simple-encrypted-socks5-proxy brite$ cat config.py
server_bind_addr = ("0.0.0.0", 4040)
local_bind_addr = ("127.0.0.1", 6060)

server_proxy_addr = ("my-vps-ip", server_bind_addr[1])

def encode(c):
  return chr(c^245)
yudeMacBook-Air:simple-encrypted-socks5-proxy brite$ python local.py
会显示:
--> 127.0.0.1:6060 --> my-vps-ip:4040 -->
(上面黄色文字是我修改后的值。只需修改config.py, 不要修改server.py和local.py)
然后设置浏览器的socks5代理服务器为127.0.0.1:6060 ,浏览器即可翻墙。

项目地址:https://github.com/tuoxie007/simple-encrypted-socks5-proxy
这是个6年前就存在了的项目,真是“养在深闺,人未识”啊。

类似的项目:
mixo,详见https://briteming.blogspot.com/2018/03/mixo.html
s5proxy-by-lyncir, 详见 利用s5proxy-by-lyncir翻墙
这三个都是基于python的翻墙术。

Viewing all articles
Browse latest Browse all 20522

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>